Dezember 2022
Titel
SSA-552874 V1.0: Denial of Service Vulnerability in SIPROTEC 5 Devices
Veröffentlicht
13. Dezember 2022 01:00
Text
Devices of the SIPROTEC 5 family contain a vulnerability related to secure client-initiated renegotiation. This could allow an unauthenticated attacker to cause a denial of service condition for the duration of the attack. Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet ...
Titel
SSA-274900 V1.3 (Last Update: 2022-12-13): Use of Hardcoded Key in SCALANCE X Devices Under Certain Conditions
Veröffentlicht
13. Dezember 2022 01:00
Text
SCALANCE X devices might not generate a unique random key after factory reset, and use a private key shipped with the firmware. Siemens has released updates for the affected products and recommends to update to the latest versions.
Titel
SSA-712929 V1.5 (Last Update: 2022-12-13): Denial of Service Vulnerability in OpenSSL (CVE-2022-0778) Affecting Industrial Products
Veröffentlicht
13. Dezember 2022 01:00
Text
A vulnerability in the openSSL component (CVE-2022-0778, [0]) could allow an attacker to create a denial of service condition by providing specially crafted elliptic curve certificates to products that use a vulnerable version of openSSL. Siemens has released updates for several affected products and recommends to update to the latest ...
Titel
SSA-700053 V1.0: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go
Veröffentlicht
13. Dezember 2022 01:00
Text
Siemens Teamcenter Visualization and JT2Go are affected by multiple file parsing vulnerabilities that could be triggered when the application reads a malicious file in CGM or RAS format. If a user is tricked to open a malicious file with the affected products, this could lead the application to crash or ...
Titel
SSA-638652 V1.2 (Last Update: 2022-12-13): Authentication Bypass Vulnerability in Mendix SAML Module
Veröffentlicht
13. Dezember 2022 01:00
Text
The Mendix SAML module insufficiently protects from packet capture replay. This could allow unauthorized remote attackers to bypass authentication and get access to the application. Mendix has provided fix releases for the Mendix SAML module and recommends to update to the latest version. Note: For compatibility reasons, fix versions are ...
Titel
SSA-678983 V1.6 (Last Update: 2022-12-13): Vulnerabilities in Industrial PCs and CNC devices using Intel CPUs (November 2020)
Veröffentlicht
13. Dezember 2022 01:00
Text
Intel has published information on vulnerabilities in Intel products in November 2020. This advisory lists the Siemens IPC related products, that are affected by these vulnerabilities. In this advisory we take a representative CVE from each advisory: “Intel CSME, SPS, TXE, AMT and DAL Advisory” Intel-SA-00391 is represented by CVE-2020-8745 ...
Titel
SSA-764417 V1.6 (Last Update: 2022-12-13): Weak Encryption Vulnerability in RUGGEDCOM ROS Devices
Veröffentlicht
13. Dezember 2022 01:00
Text
The SSH server on RUGGEDCOM ROS devices is configured to offer weak ciphers by default. This could allow an unauthorized attacker in a man-in-the-middle position to read and modify any data passed over the connection between legitimate clients and the affected device. Siemens has released updates for several affected products ...
Titel
SSA-274282 V1.0: Cross Site Scripting Vulnerability in PLM Help Server V4.2
Veröffentlicht
13. Dezember 2022 01:00
Text
The Siemens PLM Help Server V4.2 for documentation contains a reflected cross-­site scripting vulnerability. This product has reached end of life, and security vulnerabilities are no longer patched. Siemens has released a new version of Documentation Server that resolves this vulnerability. See the chapter “Additional Information” below for more details.
Titel
SSA-849072 V1.0: Several Vulnerabilities in SICAM PAS before V8.06
Veröffentlicht
13. Dezember 2022 01:00
Text
SICAM PAS/PQS before V8.06 is affected by three vulnerabilities which could lead to remote code execution, privilege escalation or the creation of a denial of service condition. Siemens has released several updates for SICAM PAS/PQS and recommends to update to the latest version.
Titel
SSA-792594 V1.0: Host Header Injection Vulnerability in Polarion ALM
Veröffentlicht
13. Dezember 2022 01:00
Text
Polarion ALM contains a misconfiguration in its default Apache HTTP Server configuration that could allow an attacker to perform host header injection attacks. Siemens is preparing updates and recommends specific countermeasures for existing installations by checking for misconfigurations in configuration files.
Titel
SSA-951513 V1.3 (Last Update: 2022-12-13): Clickjacking Vulnerability in SCALANCE S, SCALANCE X-300, X-200IRT, X-200RNA and X-200 Switch Families
Veröffentlicht
13. Dezember 2022 01:00
Text
Several SCALANCE X switches contain a vulnerability that could allow an attacker to perform administrative actions if the victim is tricked into clicking on a website controlled by the attacker. The attack only works if the victim has an authenticated session on the administrative interface of the switch. Siemens has ...
Titel
SSA-572005 V1.1 (Last Update: 2022-12-13): Vulnerabilities in the Web Server of SICAM P850 and SICAM P855 Devices
Veröffentlicht
13. Dezember 2022 01:00
Text
Session fixation and incorrect parameter parsing vulnerabilities were identified in the web server of SICAM P850 and SICAM P855 devices. Siemens has released updates for the affected products and recommends to update to the latest versions.
Titel
SSA-930100 V1.0: Privilege Escalation Vulnerability in Simcenter STAR-CCM+
Veröffentlicht
13. Dezember 2022 01:00
Text
Simcenter STAR-CCM+ contains a privilege escalation vulnerability which could allow a local attacker with an unprivileged account to override or modify the service executable and subsequently gain elevated privileges. Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available.
November 2022
Titel
SSA-638652 V1.1 (Last Update: 2022-11-08): Authentication Bypass Vulnerability in Mendix SAML Module
Veröffentlicht
8. November 2022 01:00
Text
The Mendix SAML module insufficiently protects from packet capture replay. This could allow unauthorized remote attackers to bypass authentication and get access to the application. Mendix has provided fix releases for the Mendix SAML module and recommends to update to the latest version. Note: For compatibility reasons, fix versions are ...
Titel
SSA-620288 V1.1 (Last Update: 2022-11-08): Multiple Vulnerabilities (NUCLEUS:13) in CAPITAL VSTAR
Veröffentlicht
8. November 2022 01:00
Text
Multiple vulnerabilities (also known as “NUCLEUS:13”) have be identified in the Nucleus RTOS (real-time operating system) and reported in the Siemens Security Advisory SSA-044112: https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf. CAPITAL VSTAR uses an affected version of the Nucleus software and inherently contains several of these vulnerabilities. Siemens recommends specific countermeasures for products where updates ...
Titel
SSA-570294 V1.0: Multiple Vulnerabilities in SICAM Q100 Before V2.50
Veröffentlicht
8. November 2022 01:00
Text
SICAM Q100 devices contain multiple vulnerabilities that could allow an attacker to take over the session of a logged in user or to inject custom code. Siemens has released updates for the affected products and recommends to update to the latest versions.
Titel
SSA-764417 V1.5 (Last Update: 2022-11-08): Weak Encryption Vulnerability in RUGGEDCOM ROS Devices
Veröffentlicht
8. November 2022 01:00
Text
The SSH server on RUGGEDCOM ROS devices is configured to offer weak ciphers by default. This could allow an unauthorized attacker in a man-in-the-middle position to read and modify any data passed over the connection between legitimate clients and the affected device. Siemens is preparing updates and recommends specific countermeasures ...
Titel
SSA-787941 V1.0: Denial of Service Vulnerability in RUGGEDCOM ROS V4
Veröffentlicht
8. November 2022 01:00
Text
RUGGEDCOM ROS-based V4 devices are vulnerable to a denial of service attack (Slowloris). By sending partial HTTP requests nonstop, with none completed, the affected web servers will be waiting for the completion of each request, occupying all available HTTP connections. The web server recovers by itself once the attack ends. ...
Titel
SSA-853037 V1.0: File Parsing Vulnerabilities in Parasolid
Veröffentlicht
8. November 2022 01:00
Text
Parasolid is affected by out of bounds read/write vulnerabilities that could be triggered when the application reads files in X_T format. If a user is tricked to open a malicious file with the affected applications, an attacker could leverage the vulnerability to perform remote code execution in the context of ...
Titel
SSA-568428 V1.0: Weak Key Protection Vulnerability in SINUMERIK ONE and SINUMERIK MC
Veröffentlicht
8. November 2022 01:00
Text
SINUMERIK ONE and SINUMERIK MC products are affected by a weak key protection vulnerability in the integrated S7-1500 CPU. The weak key protection vulnerability in the integrated S7-1500 CPU is documented in more detail in SSA-568427 [1]. Siemens is preparing updates and recommends specific countermeasures for products where updates are ...
Titel
SSA-587547 V1.0: Unencrypted Storage of User Credentials in QMS Automotive
Veröffentlicht
8. November 2022 01:00
Text
QMS Automotive contains a vulnerability that stores user credentials in plantext within the user database. This could allow an attacker to read credentials from memory. Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available.
Titel
SSA-371761 V1.0: Arbitrary Code Execution Vulnerability in the Logback Component of SINEC NMS before V1.0.3
Veröffentlicht
8. November 2022 01:00
Text
SINEC NMS versions before V1.0.3 are affected by a vulnerability in the logback component (CVE-2021-42550) that could allow attackers with write access to the logback configuration file to execute arbitrary code on the system. Siemens has released an update for SINEC NMS and recommends to update to the latest version.
Titel
SSA-362164 V1.2 (Last Update: 2022-11-08): Predictable Initial Sequence Numbers in the TCP/IP Stack of Nucleus RTOS
Veröffentlicht
8. November 2022 01:00
Text
The networking component (Nucleus NET) in Nucleus Real-Time Operating System (RTOS) use Initial Sequence Numbers for TCP-Sessions that are predictable. Siemens has released updates for several affected products and recommends to update to the latest versions. Siemens recommends specific countermeasures for products where updates are not available.
Titel
SSA-120378 V1.0: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go
Veröffentlicht
8. November 2022 01:00
Text
Siemens Teamcenter Visualization and JT2Go are affected by multiple file parsing vulnerabilities that could be triggered when the application reads malicious TIF, CGM or PDF files. If a user is tricked to open a malicious TIF, CGM or PDF file with the affected products, this could lead the application to ...
Titel
SSA-400332 V1.1 (Last Update: 2022-11-08): Insufficient Design IP Protection in IEEE 1735 Recommended Practice - Impact to Questa and ModelSim
Veröffentlicht
8. November 2022 01:00
Text
A security research [1] identified weaknesses in the IEEE 1735 recommended practice for encryption of Design IP, which could allow a sophisticated attacker access to unencrypted Design IP data in IEEE 1735-compliant products. This advisory addresses the specific details for the affected Siemens software products: Questa and ModelSim simulators. Siemens ...

Letzte Updates

BOSCH PSIRT
31.10.2024
SIEMENS CERT
22.11.2024
US CERT
08.11.2024
US CERT (ICS)
21.11.2024

Nach Quelle

Archiv

2024
2023
2022
2021
2020
2019
2018
2017

Feeds